Protecting networks against diffusive attacks: game-theoretic resource allocation for contagion mitigation
暂无分享,去创建一个
Jason Tsai | Milind Tame | J. Tsai | M. Tame
[1] Jon M. Kleinberg,et al. Sequential Influence Models in Social Networks , 2010, ICWSM.
[2] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[3] Shishir Bharathi,et al. Competitive Influence Maximization in Social Networks , 2007, WINE.
[4] D. Watts,et al. A generalized model of social and biological contagion. , 2005, Journal of theoretical biology.
[5] Tibor Bosse,et al. Multi-Agent Model For Mutual Absorption Of Emotions , 2009, ECMS.
[6] Milind Tambe,et al. A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.
[7] Rajmohan Rajaraman,et al. Existence Theorems and Approximation Algorithms for Generalized Network Security Games , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[8] Dirk Helbing,et al. Simulating dynamical features of escape panic , 2000, Nature.
[9] Ramamohan Paturi,et al. Connected Coordination: Network Structure and Group Coordination , 2009 .
[10] Roger Wattenhofer,et al. Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.
[11] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[12] M. Erb,et al. Are emotions contagious? Evoked emotions while viewing emotionally expressive faces: quality, quantity, time course and gender differences , 2001, Psychiatry Research.
[13] Jacob Goldenberg,et al. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .
[14] Jonathan Gratch,et al. The effect of expression of anger and happiness in computer agents on negotiations with humans , 2011, AAMAS.
[15] Sigal G. Barsade,et al. Group emotion: A view from top and bottom. , 1998 .
[16] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.
[17] Serge P. Hoogendoorn,et al. Gas-Kinetic Modeling and Simulation of Pedestrian Flows , 2000 .
[18] Deborah A. Small,et al. The Face of Need: Facial Emotion Expression on Charity Advertisements , 2009 .
[19] N. Badler,et al. Crowd simulation incorporating agent psychological models, roles and communication , 2005 .
[20] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[21] Benjamin W. K. Hung. Optimization-based selection of influential agents in a rural Afghan social network , 2010 .
[22] N. Christakis,et al. Dynamic spread of happiness in a large social network: longitudinal analysis over 20 years in the Framingham Heart Study , 2008, BMJ : British Medical Journal.
[23] W. O. Kermack,et al. A contribution to the mathematical theory of epidemics , 1927 .
[24] Tsai-Yen Li,et al. Simulation of Social Behaviors in Virtual Crowd , 2010 .
[25] L. Festinger. A Theory of Social Comparison Processes , 1954 .
[26] N. Christakis,et al. The Spread of Obesity in a Large Social Network Over 32 Years , 2007, The New England journal of medicine.
[27] Alexander Shapiro,et al. On the Rate of Convergence of Optimal Solutions of Monte Carlo Approximations of Stochastic Programs , 2000, SIAM J. Optim..
[28] Funda Durupinar. From audiences to mobs: Crowd simulation with psychological factors (Kitlelerden güruhlara: Psikolojik faktörlerle kalabalık simülasyonu) , 2010 .
[29] Timothy D. Wilson,et al. A model of dual attitudes. , 2000, Psychological review.
[30] R. Doherty. The Emotional Contagion Scale: A Measure of Individual Differences , 1997 .
[31] Ramamohan Paturi,et al. Does more connectivity help groups to solve social problems , 2011, EC '11.
[32] Asuman E. Ozdaglar,et al. Optimization-based influencing of village social networks in a counterinsurgency , 2011, TIST.
[33] Rong Yang,et al. A robust approach to addressing human adversaries in security games , 2012, AAMAS.
[34] S. Pugh,et al. Service with a smile: Emotional contagion in the service encounter. , 2001 .
[35] Rong Yang,et al. Designing better strategies against human adversaries in network security games , 2012, AAMAS.
[36] Alan M. Elkins. Understanding Human Behavior for Effective Police Work , 1976 .
[37] M. Degroot. Reaching a Consensus , 1974 .
[38] T. Schelling. Micromotives and Macrobehavior , 1978 .
[39] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[40] H. Kelman. Compliance, identification, and internalization three processes of attitude change , 1958 .
[41] Tamara G. Kolda,et al. Community structure and scale-free collections of Erdös-Rényi graphs , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.
[42] Natalie Fridman,et al. Comparing Human and Synthetic Group Behaviors : A Model Based on Social Psychology , 2009 .
[43] Wei Chen,et al. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.
[44] Rajmonda Sulo Caceres,et al. The Impact of Structural Changes on Predictions of Diffusion in Networks , 2008, 2008 IEEE International Conference on Data Mining Workshops.
[45] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[46] Ning Wang,et al. Rapport and facial expression , 2009, 2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops.
[47] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[48] Martin Bichler,et al. Identification of influencers - Measuring influence in customer networks , 2008, Decis. Support Syst..
[49] M. Schweitzer,et al. Feeling and believing: the influence of emotion on trust. , 2003, Journal of personality and social psychology.
[50] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[51] Nicholas J. Howard,et al. Finding optimal strategies for influencing social networks in two player games , 2010 .
[52] Jerome M. Chertkoff,et al. Don't Panic: The Psychology of Emergency Egress and Ingress , 1999 .
[53] Pierre Philippot,et al. Facial Reactions to Emotional Facial Expressions: Affect or Cognition? , 1998 .
[54] J. Zittartz,et al. Cellular Automaton Approach to Pedestrian Dynamics - Applications , 2001, cond-mat/0112119.
[55] K. Pauwels,et al. Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site , 2009 .
[56] Norman I. Badler,et al. Creating crowd variation with the OCEAN personality model , 2008, AAMAS.
[57] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[58] Craig A. Smith,et al. Patterns of cognitive appraisal in emotion. , 1985, Journal of personality and social psychology.
[59] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[60] James Aspnes,et al. Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.
[61] Masahiro Kimura,et al. Extracting influential nodes on a social network for information diffusion , 2009, Data Mining and Knowledge Discovery.
[62] Divyakant Agrawal,et al. Limiting the spread of misinformation in social networks , 2011, WWW.
[63] L. F. Henderson. On the fluid mechanics of human crowd motion , 1974 .
[64] Sigal G. Barsade. The Ripple Effect: Emotional Contagion and its Influence on Group Behavior , 2002 .
[65] Gadi Fibich,et al. Aggregate Diffusion Dynamics in Agent-Based Models with a Spatial Structure , 2010, Oper. Res..
[66] Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
[67] T. Schelling. Hockey Helmets, Concealed Weapons, and Daylight Saving , 1973 .
[68] Kyle Beardsley,et al. Peacekeeping and the Contagion of Armed Conflict , 2011 .
[69] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[70] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[71] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[72] Joseph P. Forgas,et al. Affective influences on individual and group judgments , 1990 .
[73] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[74] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[75] Mark S. Granovetter. Threshold Models of Collective Behavior , 1978, American Journal of Sociology.
[76] Stacy Marsella,et al. Virtual Rapport , 2006, IVA.
[77] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[78] Po-An Chen,et al. Better vaccination strategies for better people , 2010, EC '10.
[79] David K. Perry,et al. Viral Marketing or Electronic Word-of-Mouth Advertising: Examining Consumer Responses and Motivations to Pass Along Email , 2004, Journal of Advertising Research.
[80] B. Rothbaum,et al. Virtual reality exposure therapy for Vietnam veterans with posttraumatic stress disorder. , 2001, The Journal of clinical psychiatry.
[81] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[82] Weiguo Song,et al. A cellular automata evacuation model considering friction and repulsion , 2005 .
[83] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[84] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[85] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[86] Alicia A. Grandey,et al. Emotion regulation in the workplace: a new way to conceptualize emotional labor. , 2000, Journal of occupational health psychology.
[87] John von Neumann,et al. 1. A Certain Zero-sum Two-person Game Equivalent to the Optimal Assignment Problem , 1953 .
[88] Milind Tambe,et al. Empirical Evaluation of Computational Emotional Contagion Models , 2011, IVA.
[89] Xiaohong Chen,et al. An Empirical Study of Word-of-Mouth Generation and Consumption , 2012, Mark. Sci..
[90] Allan Borodin,et al. Threshold Models for Competitive Influence in Social Networks , 2010, WINE.
[91] Mark Newman,et al. Networks: An Introduction , 2010 .
[92] Milind Tambe,et al. ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison , 2011, AAMAS.
[93] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[94] Yiqing Lin,et al. Agent-Based Simulation of Evacuation: An Office Building Case Study , 2010 .
[95] Lars-Olov Lundqvist,et al. Factor structure of the Greek version of the Emotional Contagion Scale and its measurement invariance across gender and cultural groups , 2008 .
[96] Helbing,et al. Social force model for pedestrian dynamics. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[97] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[98] Duncan J. Watts,et al. Cooperation and Contagion in Networked Public Goods Experiments , 2010, ArXiv.
[99] D. Farrington,et al. Development and validation of the Basic Empathy Scale. , 2006, Journal of adolescence.
[100] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[101] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[102] Giuseppe Riva,et al. Virtual Reality in Psychotherapy: Review , 2005, Cyberpsychology Behav. Soc. Netw..
[103] Manish Jain,et al. Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.
[104] A. Schadschneider,et al. Simulation of pedestrian dynamics using a two dimensional cellular automaton , 2001 .
[105] M. Kearns,et al. An Experimental Study of the Coloring Problem on Human Subject Networks , 2006, Science.
[106] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[107] W. Wood,et al. Minority influence: a meta-analytic review of social influence processes. , 1994, Psychological bulletin.
[108] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[109] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[110] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[111] J. Kulik,et al. Social Comparison, Affiliation, and Emotional Contagion under Threat , 2000 .
[112] Marcelo Luis Errecalde,et al. Evacuation simulations using cellular automata , 2007 .
[113] Mark Hoogendoorn,et al. An Agent-Based Model for the Interplay of Information and Emotion in Social Diffusion , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[114] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[115] Eric Budish,et al. IMPLEMENTING RANDOM ASSIGNMENTS : A GENERALIZATION OF THE BIRKHOFF-VON NEUMANN THEOREM , 2009 .
[116] Mathew D. McCubbins,et al. The Democratic Dilemma: Can Citizens Learn What They Need to Know? , 1998 .
[117] S. Bem. The measurement of psychological androgyny. , 1974, Journal of consulting and clinical psychology.
[118] J. Cacioppo,et al. Emotional Contagion , 1993 .
[119] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[120] Michel C. A. Klein,et al. Agent-Based Analysis of Patterns in Crowd Behaviour Involving Contagion of Mental States , 2011, IEA/AIE.
[121] James Aspnes,et al. Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network? , 2007, OPODIS.
[122] Tibor Bosse,et al. A Multi-agent Model for Emotion Contagion Spirals Integrated within a Supporting Ambient Agent Model , 2009, PRIMA.